IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

IM (Identity Management)

RSS Feed    Add to Google    Add to My Yahoo!
IM (Identity Management)Reports
 
Protecting your Customers’ Online Banking Transactions Using the ActivID® Threat Detection Service
sponsored by HID
WHITE PAPER: This white paper introduces a solution that helps financial institutions mitigate the risks of even the most sophisticated malware.
Posted: 25 Jul 2014 | Published: 24 Mar 2014

HID

Who, What, Where? How the Cloud Complicates Identity Management
sponsored by SearchExchange.com
EBOOK: In the era of consumerization, cloud computing and heightened security worries, running an effective identity management program is no small task.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

SearchExchange.com

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: This white paper features an automated identity and access management (IAM) solution that accommodates physical and cloud environment users to ensure that the right people have the right access to virtualized resources and applications.
Posted: 05 Mar 2014 | Published: 31 Dec 2011

IBM

Enterprise Universal Access One secure credential for logical, physical, local and remote access
sponsored by HID
WHITE PAPER: This white paper explores leading solutions designed to create successful enterprise authentication.
Posted: 09 Jul 2014 | Published: 19 Sep 2013

HID

Leveraging Privileged Identity Governance to Improve Security Posture
sponsored by CA Technologies.
WHITE PAPER: This exclusive resource takes an in-depth look at insider attacks, and discusses how privileged identity governance can help you identify and deal with potential threats from within your own environment.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

CA Technologies.

ActivID® Authentication Appliance for Enterprise
sponsored by HID
WHITE PAPER: In this white paper, discover a solution that puts an end to your identity and authentication worries.
Posted: 07 Jul 2014 | Published: 20 Feb 2013

HID

Leverage Security Intelligence to Protect Sensitive Healthcare Data
sponsored by IBM
WHITE PAPER: This guide explores the importance of end-to-end system visibility and security intelligence for healthcare organizations, and how to combat a full range of security threats.
Posted: 26 Mar 2014 | Published: 31 Dec 2013

IBM

Predictions 2014: Identity and Access Management
sponsored by IBM
ANALYST REPORT: This Gartner report reveals predictions for identity and access management (IAM) tools needed for 2014.
Posted: 17 Apr 2014 | Published: 26 Nov 2013

IBM

Securing the Mobile Cloud Connected Enterprise
sponsored by CA Technologies.
WHITE PAPER: This resource reveals the role of identity and access management in improving access and secure collaboration in today's mobile, cloud-connected IT environment.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

CA Technologies.

Defending Against Insider Threats in the “Snowden Era”
sponsored by CA Technologies.
WHITE PAPER: Security breaches are a significant threat for organizations in the age of big data: broken privacy laws, reputational damage, and loss of classified information are very real possibilities. What's worse is one of the most commonplace and damaging causes of security breaches can come from the inside of your business.
Posted: 28 Jan 2014 | Published: 31 Dec 2013

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement